Review Article

Privacy Models in Wireless Sensor Networks: A Survey

Figure 6

Considered threat distribution.